Spelling suggestions: "subject:"rrt anda science."" "subject:"rrt ando science.""
121 |
A study of the Wujing Qishu =Ng, Ka-wah., 吳嘉華. January 2005 (has links)
published_or_final_version / abstract / Chinese Historical Studies / Master / Master of Arts
|
122 |
FORCEnet an analysis of the Trident Warrior 2003 exerciseLagana, John P. 09 1900 (has links)
Approved for public release; distribution is unlimited / Since the country has moved into the Information Age, the military forces have been moving towards network based operations. The rapid expansion of the internet and information technology (IT) has led to the emerging theory of Network- Centric Warfare (NCW). The Naval Services instantiation of NCW is FORCEnet. "FORCEnet is the "glue" that binds together Sea Strike, Sea Shield, and Sea Basing. It is the operational construct and architectural framework for naval warfare in the Information Age, integrating warriors, sensors, command and control, platforms, and weapons into a networked, distributed combat force. FORCEnet will provide the architecture to increase substantially combat capabilities through aligned and integrated systems, functions, and missions. Sea Power 21 is a comprehensive attempt to address the ramifications of the Information Age revolution. The framework of the Sea Power 21 vision is composed of the following elements: Sea Basing, Sea Shield and Sea Strike. The enabler of this vision or the "glue" that holds it all together is FORCEnet. FORCEnet is "the operational construct and architectural framework of naval warfare in the information age that integrates Warriors, sensors, networks, command and control, platforms, and weapons into a networked, distributed combat force that is scaleable across all levels of conflict from seabed to space and sea to land." The Trident Warrior 03 exercise was then developed as a means to measure its success and to acquire data from which future exercises can be measured against. FORCEnet is still in its infancy and many people have different views on what exactly it is and how it should be implemented to achieve those goals. The intent of this thesis was not to answer those questions per se, but provide a realistic analysis of what worked during the TW03 exercise and what did not. This should provide a baseline for further Trident Warrior exercises so as to avoid the same mistakes in the future. The military has a ways to go before it can fully realize a truly networked-centric armed forces, but TW03 was the beginning and the lessons learned from it will pay dividends in realizing that fully networked goal. / Major, United States Marine Corps
|
123 |
Security sector reform and the Serbia conundrum are SSR efforts bringing Serbia closer to European Union and North Atlantic Treaty Organization Integration?Lewis, Marion J. 12 1900 (has links)
The NATO intervention in the wars in the former Yugoslavia from 1991 to 1999 illustrated the importance of South Eastern Europe to Atlantic security. In 2005, certain of the southern Slav nations have gained NATO and EU membership, as in the case of Slovenia, or have drawn ever closer to qualifying for membership, as in the case of Croatia and Bulgaria. However, Serbia and Montenegro and Bosnia and Herzegovina have proved more difficult to draw into the European fold due to the lingering effects of the wars in Bosnia and Kosovo. This thesis explores Serbia's ongoing attempts to integrate into EU and NATO structures. It begins with the background of the situation in Serbia of 2005 with a focus on the historical leadership, management, and missions of the security sector. It then examines the development and objectives of the security sector reform agenda and the challenges facing its practitioners. Additionally, this thesis analyses the impact of the International Tribunal for the Former Yugoslavia, Kosovo final status disposition, and the chaotic domestic political situation on Serbian reform efforts. This thesis argues that, as a result of political and social circumstances unique to Serbia as well as the institutional shortcomings of the West as concerns comprehensive democratic reform of power and arms, the ongoing SSR efforts in Serbia will take several years to come to fruition.
|
124 |
Understanding Indian insurgencies implications for counterinsurgency operations in the Third WorldMitra, D. M. 12 1900 (has links)
There has been a resurgence of indigenous Maoist insurgencies in the South/South East Asia region in the recent past. Left unchecked, these developments can have significant implications for the Global War on Terror. Third World countries have inherited many attributes from their colonial past which make them susceptible to insurgency. These factors, which are typical of the Third World, limit even the capacity of democratic states to mitigate divisive tendencies. This paper analyzes the susceptibility of Third World countries to insurgency and develops a theoretical perspective to illuminate some of the factors contributing to insurgency in these countries. A simple linear model for India is developed, based on the hypothesis that the degree of inaccessibility of an area, the strength of separate social identity of its population, and the amount of external unifying influence on the area determine the propensity of that area for insurgency. The model is empirically verified for the entire country by comparing data from India's 528 parliamentary constituencies. The implications of the Indian model for some competing ideas about appropriate counterinsurgency strategy for the Third World countries are discussed.
|
125 |
Enhancing the extended awareness capability of the ESG integrating Shotspotter and Cursor on Target technologies with unmanned aerial vehicles to enhance the mission capability of the ESGGibbons, Thomas J., Schaeffer, Kevin M. 06 1900 (has links)
This thesis discusses two emerging technologies and how their integration with UAVs can improve the situational awareness capability of the Expeditionary Strike Group. Shotspotter is an acoustic gunshot detection system and Cursor on Target is an XML based schema to enhance information exchanges. When integrated with UAVs, these two technologies will drastically improve an ESG's efficiency and lethality in combat.
|
126 |
Analysis of high-resolution COAMPS with observed METOC data to demonstrate atmospheric impact on EM propagationMurphy, Richard M. 09 1900 (has links)
Current U.S. Navy Special Warfare and submarine concepts of operations (CONOPS) dictate that in-situ environmental data collection is limited or not possible. Therefore, predicted data from operational models, such as the Coupled Ocean Atmosphere Mesoscale Prediction System (COAMPS), are essential to estimate the impacts of environmental conditions on the detection of enemy targets and counter-detection by radar and optical sensors. This study compares the use of high-resolution COAMPS data and in-situ shipboard and rawinsonde measurements for detection prediction purposes. The evaluation is based on data from Fleet Exercise SILENT HAMMER conducted off the Southern California coast near San Clemente Island in October 2004. An instrumented vessel was used for continuous surface layer data collection and frequent rawinsonde launches. COAMPS meteorological predictions were obtained at 3- and 9-km resolutions. The shipboard and COAMPS data provided refractivity profiles that were then used with propagation models within the BUILDER and AREPS graphical user interfaces to obtain signal-to-noise and propagation loss versus range diagrams. An increase in the horizontal resolution of COAMPS from 9 to 3 km did not significantly improve the prediction of meteorological variables within the lower marine boundary layer. However, counter-intuitively, the higher resolution did slightly improve detection range estimates.
|
127 |
Organized crime in the United States organizational analogies for counterinsurgency strategyPrivette, William Heath 12 1900 (has links)
As modern warfare moves towards the lower end of the intensity spectrum, conventional forces are placed in unconventional roles outside their traditional high intensity military specialty. By showing that there are analogies between organized crime and insurgencies, further studies can be conducted on the applicability of modern law enforcement tactics to military operations. This thesis shows that there are organizational and conceptual analogies between organized crime families and insurgencies. They both organize themselves as secret societies with similar hierarchical command structures for both survival and operational needs. Both organized crime families and insurgencies must remain hidden from authorities, whether from law enforcement agencies such as the FBI or the military. The similarity between organized crime and insurgent organizations provides a broad basis for further study in other areas. The FBI and other law enforcement agencies have been combating organized crime families for decades and have used proven techniques of infiltration, informants, wiretaps and electronic eavesdropping to expose organized crimeâ s largely invisible network. Based on the similarities between organized crime families and insurgent organizations, law enforcement tactics and their applicability to modern counterinsurgency doctrine are an area for further study.
|
128 |
Honduras' national security strategy to combat terrorismFunes Ponce, Raynel E. 12 1900 (has links)
After the September 11 attacks, Honduras committed to support the GWOT, but priorities in national objectives other than terrorism have kept the Honduran government from developing a strategy and the necessary counterterrorism infrastructure to combat this emerging threat. This research examines current threats in Latin America and Honduras in particular. It also suggests a developmental strategy to enhance the country[alpha]s capabilities to combat terrorism by the employment of instruments of national power in a multidimensional way capable to prevent, deter, and respond to terrorist acts. This study uses a brief analysis based on the concepts of suitability, feasibility, and acceptability in order to identify the risk that the proposed strategy could incur. The study concludes by proposing a series of recommendations that should minimize risk and make this strategy feasible for supporting the GWOT.
|
129 |
Analysis of operational pace versus logistical support rate in the ground combat element of a Marine Expeditionary BrigadeMiner, Roy 09 1900 (has links)
, and the transportation capacity assets within the CSSE dedicated to moving supplies are all significant contributing factors in sustaining the movement of the GCE. This thesis defines a logistics process and develops a simulation where the GCE consumes logistical resources necessary to sustain its movement toward assigned objectives while being supported by a CSSE in an expanding maneuver warfare environment. We define a successful sustainment of the GCE and using logistic regression, confirm the above three factors contribute significantly to the success rate of sustainment in the simulation. Through regression and leverage plots we determine which of the three factors contribute significantly more to the responses of success and time. We also conclude through a sample means comparison the combination of factor values that achieve a minimal delay in sustainment for the GCE in the simulation.
|
130 |
Small unmanned aerial system (SUAS) flight and mission control support system (FMCSS) designLamb, Timothy G. 09 1900 (has links)
Unmanned Aerial Systems (UAS) are playing a significant role in the Global War on Terrorism (GWOT). Until recently, small UAS (SUAS) were an insignificant part of these efforts. Now their numbers exceed those of their larger counterparts by an order of magnitude. Future projections anticipate a growing demand for SUAS making now the best time to examine the functions they perform in order to make better decisions concerning their future design and development. This thesis provides a brief history of UAS and discusses the current capabilities and mission areas in which they perform. Their relevance to modern warfare and assumptions concerning their future roles on the battlefield is presented. Predominant UAS missions are identified, as well as the technical requirements deemed necessary for their success. A generic UAS functional model is developed to illustrate where the challenges and technology gaps manifest in SUAS design. Possible technology solutions that could fill these gaps are presented and a field experiment is conducted to demonstrate the feasibility of several possible solutions. The goal of this thesis is to identify existing technology gaps and offer technology solutions that lead to better design of future SUAS flight and mission control support systems (FMCSS).
|
Page generated in 0.0853 seconds